Логотип exploitDog
bind:CVE-2025-12888
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-12888

Количество 5

Количество 5

ubuntu логотип

CVE-2025-12888

3 месяца назад

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-12888

3 месяца назад

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-12888

2 месяца назад

Constant Time Issue with Xtensa-based ESP32 and X22519

EPSS: Низкий
debian логотип

CVE-2025-12888

3 месяца назад

Vulnerability in X25519 constant-time cryptographic implementations du ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xmgq-3783-qgm4

3 месяца назад

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-12888

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.

CVSS3: 7.5
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-12888

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.

CVSS3: 7.5
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-12888

Constant Time Issue with Xtensa-based ESP32 and X22519

0%
Низкий
2 месяца назад
debian логотип
CVE-2025-12888

Vulnerability in X25519 constant-time cryptographic implementations du ...

CVSS3: 7.5
0%
Низкий
3 месяца назад
github логотип
GHSA-xmgq-3783-qgm4

Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa.

CVSS3: 7.5
0%
Низкий
3 месяца назад

Уязвимостей на страницу